How does a SQL injection attack work?
What is SQL injection?
How to defend against SQL injection
SQL injections have been used in multiple cyber attacks over the last 20 years, often as an initial probe before other, more sophisticated tools and techniques are deployed. They’re nothing to scoff at, though. SQL injection can result in a stolen, deleted, or altered sensitive data. Attackers can create fake identities, change transactions, make themselves database administrators, or even go so far as to completely take over the webserver. SQL injection attacks were used in the 2020 Free pick data breach to access 8.3 million users’ records, and in 2015's mammoth Talk-Talk breach, resulting in the theft of over 150,000 customers’ personal data and a £400,000 pound fine against the firm. Back in 2012, a group also used SQL injection attacks to steal 450,000 Yahoo users' login information, in one of a number of breaches that have hit the embattled web company over the past decade. According to a report from web security firm Akamai, SQL injection attacks have accounted for more than 65% of web-based attacks between November 2017 and March 2019, with the US and the UK topping the charts as the most frequently targeted countries.
0 Comments